Episode 278 of The CyberJungle is about 35 minutes long. You can hear it by clicking on the flash player below. The interview with Ryan Washington, begins at about the 16min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

Episode 277 of The CyberJungle is about 30 minutes long. You can hear it by clicking on the flash player below. The interview with Vladimir Katalov, begins at about the 16min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

Interview

Vladimir Katalove, CEO of ElcomSoft, talks with Ira about a flaw discovered this past summer that impacts file encryption on may laptops. Now exploit code has been released, and there is confirmation by a third part of the flaw. This flaw can be leveraged by forensic analysts to break files protected with Microsoft Encrypted File System (EFS).

Episode 276 of The CyberJungle is about 36 minutes long. You can hear it by clicking on the flash player below. The interview with John Strand, begins at about the 22min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

Interview

Tales From The Dark Web

Our Take on This Weeks News

*Congress: Chinese telecom firm Huawei a national security threat. The CyberJungle interview with FX following his Huawei security presentation, at DefCon20 this summer. Listen here, starting at about the 14min mark.

Episode 220 of The CyberJungle is about 34 minutes long. You can hear it by clicking on the flash player below. The interview begins at about 19min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

SonicWall; Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing Magazine. Data Clone Labs is the premier SonicWall Medallion Partner for all your security needs.

DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 83 of the Data Security Podcast

* Ira has a conversation with Cheryl Traverse President/ Chief Executive Officer with Xceedium, a company that provides centralized, secure IT operations management. Ira and Cheryl talk about the controls that protect against insider threats, and help put organizations in compliance with data security and privacy mandates.

* Tales From The Dark Web: Bank attacks hides in ‘software update’ links. This attack combines the fear of not properly patching with attacks that empty business bank accounts. Hat tip to the story in Darkreading.com .

SonicWall; Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing Magazine. Data Clone Labs is the premier SonicWall Medallion Partner for all your security needs.

DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 72 of the Data Security Podcast

* Conversation: Ira talks about a dangerous new twist to the banking attacks Yuval Ben-Izhak the CTO of security company Finjan. Here is the link to the Finjan Report on the new Zeus bank Trojan mentioned in the segment.

* Tales From The Dark Web: Polymorphic malware – every time it attacks it has a different signature. That means you anti-virus won’t recognize it. Ira talked about the presentation at ISACA Security and Risk Conference by Stuart Staniford, the Chief Scientist at FireEye. Read the related Anti-Phishing Working Group paper on the topic.

* From Our Take on The News: Secure Flight Program by the TSA. EPIC (The Electronic Privacy Information Center) follows the surveillance and profiling of airline passengers. Their most recent post on the TSA “Secure Flight” program was in 2007, when the organization recommended that “secure flight should be grounded” due to privacy concerns. The program is now being expanded to require airline passengers to provide their date of birth when they purchase an airline ticket. See: http://epic.org/privacy/airtravel/secureflight.html